Statistics for topic cyber-threat-intelligence
RepositoryStats tracks 518,986 Github repositories, of these 52 are tagged with the cyber-threat-intelligence topic. The most common primary language for repositories using this topic is Python (20).
Stargazers over time for topic cyber-threat-intelligence
Most starred repositories for topic cyber-threat-intelligence (view more)
Trending repositories for topic cyber-threat-intelligence (view more)
A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.
Web app that provides basic navigation and annotation of ATT&CK matrices
An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.
A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
Web app that provides basic navigation and annotation of ATT&CK matrices
A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.
Attack Flow helps executives, SOC managers, and defenders easily understand how attackers compose ATT&CK techniques into attacks by developing a representation of attack flows, modeling attack flows f...
An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.
Attack Flow helps executives, SOC managers, and defenders easily understand how attackers compose ATT&CK techniques into attacks by developing a representation of attack flows, modeling attack flows f...
A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.
Web app that provides basic navigation and annotation of ATT&CK matrices
CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable reports more consistently and efficiently.
Secutils.dev is an open-source, versatile, yet simple security toolbox for engineers and researchers
Modular web-application honeypot platform built using go and gin
Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious domain and IPv4 lists.
A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.
Web app that provides basic navigation and annotation of ATT&CK matrices
Secutils.dev is an open-source, versatile, yet simple security toolbox for engineers and researchers
Modular web-application honeypot platform built using go and gin
Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious domain and IPv4 lists.
A collection of awesome framework, libraries, learning tutorials, videos, webcasts, technical resources and cool stuff about Security Orchestration, Automation and Response (SOAR).
Finds related domains and IPv4 addresses to do threat intelligence after Indicator-Intelligence collects static files.